Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Video Surveillance

Using Video Management Systems for Effective Investigations

By Bill Zalud
Security Officer Looking at multiple video screens
Security camera
High-definition and megapixel cameras encourage the application of video management software that is more sophisticated to handle security and other business needs.
Security at JCPenney
Live monitoring is one of three functions of a video management system. The other two: taking action on alarms and forensics or review of recorded video.
Security Officer Looking at multiple video screens
Security camera
Security at JCPenney
July 1, 2012

It’s a matter of flexibility, contends Colin Adderley. Bryant Garrett adds integration and scalability, in addition to flexibility, to his needs. For Robert Knell, it’s the perfect bundle: a system providing a wide spectrum of features, granular configuration options, creating a highly flexible and customizable solution.

It’s video management software or VMS, the heart of a growing number of enterprise and government security systems. Current and emerging VMS approaches incorporate more intelligence into their design, including video analytics and the ability to interface with life safety and access control systems. With advancement of high-definition video, megapixel cameras and IP infrastructures, VMS is evolving to be more than just a security solution.

Basically, a VMS receives video from cameras and allows someone to view that video either live or recorded. There are three main functions. First is live monitoring, which accounts for less of uses these days but still important. The second is the ability to react to alarms or events, which can be triggered by something as simple as a motion detector or input from an access control system. The third is the use of VMS as an investigation tool – forensics – to figure out what has happened.

 

Consider Expansion

A VMS provides a cost-effective way to continually upgrade and expand solutions without having to completely rip out an old system. It can also act as a video enabler for other security and business systems. A VMS is also a way to bring down costs by incorporating more components into an overall solution.

With forensics, there is equally more VMS focus on tools such as search, synopsis and metadata. Now that VMS platforms are being recognized as the real “brain” of systems, emphasis shifts to interfaces and experiences like centralized control with local access options, automatic device discovery, flexible administrative rules, intuitive navigation for different skill levels and more.

One example: The City of Calgary’s light rail transit system called CTrain employs Genetec’s Omnicast video surveillance platform to keep passengers safe. “One of the major advantages of choosing Omnicast is its flexibility,” says Adderley, project manager and engineer for the city. “The flexibility in architectural design of the system has allowed us to minimize single points of failure along all portions of the system. And the open architecture allows us to use our ‘flavor of the day’ cameras to accommodate vendor competition through different product life cycles. Plus, the whole system is cheaper on a per-camera basis so we can maximize our coverage with allocated funds.”

 

Moving Beyond Legacy Gear

When CTrain was first built, a security video system was installed comprising a matrix of analog cameras transmitting analog video to tapes, and eventually digital video recorders, which processed and archived the footage.

In searching for a suitable replacement, several qualities were paramount. Calgary needed an open platform system to maximize flexibility under strict procurement models, as well as a mature and proven piece of software that could easily integrate with their large monitor wall and run across multiple work stations. The CTrain also required a multitude of software configuration options and the ability to easily scale the system as needed based on the addition of new transit stations to the CTrain’s constantly growing lines.

An IP solution was deemed most suitable, providing reduced infrastructure costs for a system that would be spread across a number of physical locations (i.e., stations), as well as increased system security. An added benefit would be the creation of a robust network. This would not only house the security platform, but also facilitate an evolution in the transit organization. The network would provide a technologically advanced backbone on which all aspects of the CTrain’s management could rely and interplay smoothly.

 

System Integration, Too

The Omnicast platform integrates with a number of other systems to streamline the CTrain’s operations.

Active Directory is integrated to efficiently manage administration and organization of user profiles; SNMP (simple network management protocol) monitoring is also enabled, to provide an extra layer of reliability by alerting both operators and the integrator if any network connected device experiences a fault or performance issue. Most importantly, Omnicast has been integrated with the CTrain’s supervisory control and data acquisition) system. The SCADA system controls operator interaction with various events, often mechanical, including movement of elevators and escalators, and response to station help phones. Integration means that the SCADA system will drive alerts or requests via a serial to digital interface to the videowall and operator.

With years of experience in airport security, Garrett, CFO and chief of the Orlando Sanford International Airport (SFB) Police Department, had specific requirements. First, he wanted a video management system that would be integrative, scalable and flexible: “A non-proprietary system would allow [us] to get competitive bids from multiple hardware vendors.” Additionally, he wanted to be able to have a multiple camera screen presentation and the functionality to manipulate PTZ cameras. Most importantly, he wanted to be able to quickly switch from live to archived videos and easily export selections of archived videos in high quality format for other authorities to review from another monitoring station.

SFB decided to begin its analog-to-digital security conversion with the 150 cameras that were already in place and added another 80 cameras. Using existing fiber optic cable, the integrator, SiteSecure, built a dedicated IP video network. With this new IP infrastructure, Omnicast’s open architecture enabled SFB to both keep and choose their preferred server and hardware, and additionally gave them a very scalable solution which they could grow very easily.

 

Live Monitoring

Dispatchers monitor Sanford Airport from a remote control center. Furthermore, the intuitive drag-and-drop user interface proved popular with SFB’s personnel who found it to be simple and uncomplicated.

When the security center installation was complete, the police department in Watertown, Mass., had a system tying into 42 video cameras and 72 access controlled points. Officer Knell, systems administrator, says that implementation went “very well – a lot better than we were expecting. We had none of the issues we’ve had with other vendors, and any minor changes, such as camera angle adjustments, have been handled speedily by Signet Electronic Systems,” the integrator.

Watertown’s police department uses Bosch and Axis cameras, Genetec’s unified security platform, Security Center, which unifies Omnicast video surveillance and Synergis access control systems all in one solution.

Watertown PD is monitored 24/7, with video feeds used for real-time surveillance of prisoners as well as other spot monitoring. The prisoner and interview room feeds are burned directly to disk for indefinite archiving. All other video archives are kept for investigative purposes for a minimum of 30 days via a two terabyte storage system. There are plans to increase the storage capacity to extend past 30 days in the near future.

KEYWORDS: video feeds for security video management video surveillance news

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • IntelligenceVideo

    Using Intelligent Video to Solve Investigations

    See More
  • SEC0819-VMS-Feat-slide1_900px

    Video Management Systems for Your Security Enterprise

    See More
  • surveillance-room freepik

    Advanced technology applications drive new opportunities for video management systems

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products
×
High-definition and megapixel cameras encourage the application of video management software that is more sophisticated to handle security and other business needs.
Live monitoring is one of three functions of a video management system. The other two: taking action on alarms and forensics or review of recorded video.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!